Skip to main content
Scour
Browse
Getting Started
Login
Sign Up
You are offline. Trying to reconnect...
Close
You're currently offline. Some features may not work.
Close
Copied to clipboard
Close
Unable to share or copy to clipboard
Close
๐ Security
Authentication, Encryption, Vulnerabilities, Compliance
Filter Results
Timeframe
Fresh
Past Hour
Today
This Week
This Month
Feeds to Scour
Subscribed
All
Scoured
80533
posts in
816.5
ms
Why more CEOs and
boards
are
worrying
about security: 'The risk is everywhere.'
businessinsider.com
ยท
2d
๐
Technical Leadership
How do you use your
password
manager โ browser extension or
desktop
app?
discuss.privacyguides.net
ยท
1d
โก
Performance
SaaS
System Design
dev.to
ยท
1d
ยท
Discuss:
DEV
๐ง
System Design
Autocrypt
v2 - Post-Quantum and Reliable
Deletion
for Internet Messaging
autocrypt2.org
ยท
3d
โ๏ธ
Cloud Computing
IAM
Sentinel
: Bridging AI Reasoning with AWS Security Compliance
github.com
ยท
1d
ยท
Discuss:
DEV
๐ง
System Design
Real world
scenario
of
refactoring
legacy code to strategy & chain of responsibility patterns
dev.to
ยท
23h
ยท
Discuss:
DEV
โจ
Code Quality
Secrets management with
SOPS
Guix --
fishinthecalculator
fishinthecalculator.me
ยท
2d
๐ต
Go
How
recruitment
fraud turned cloud
IAM
into a $2 billion attack surface
venturebeat.com
ยท
4d
โ๏ธ
Cloud Computing
UK Construction Firm Hit by
Prometei
Botnet
Hiding in Windows Server
hackread.com
ยท
2d
๐
DevOps
Valuable
News
vermaden.wordpress.com
ยท
1d
๐
Open Source
Evaluating and Enhancing the
Vulnerability
Reasoning
Capabilities
of Large Language Models
arxiv.org
ยท
1d
๐ป
Software Engineering
Software Engineering with AI: Beyond
Vibe-Coding
principalengineer.com
ยท
2d
โจ
Code Quality
Changing your
password
every 90 days is
outdated
advice
makeuseof.com
ยท
3d
โจ
Code Quality
Beyond
Jailbreaking
: Why Direct Prompt Injection is Now
Arbitrary
Code Execution
pub.towardsai.net
ยท
2d
๐
Software Architecture
privacy
professionals
: working at a
messaging/social
media platform
blog.avas.space
ยท
1d
๐ป
Software Engineering
I
struggled
with system design until I learned these 114
concepts
newsletter.systemdesign.one
ยท
3d
๐ง
System Design
Software supply
chain
risks join the
OWASP
top 10 list, access control still on top
csoonline.com
ยท
5d
๐ป
Software Engineering
CySecurity
News - Latest Information Security and Hacking Incidents:
CISA
Confirms Active Exploitation of Four Critical Enterprise Software Flaws
cysecurity.news
ยท
2d
ยท
Discuss:
Blogger
๐
DevOps
The control
layer
for AI
blog.dottxt.ai
ยท
3d
ยท
Discuss:
Hacker News
๐
Software Architecture
CySecurity
News - Latest Information Security and Hacking Incidents: Widespread Cyber Espionage Campaign
Breaches
Infrastructure in 37 Countries
cysecurity.news
ยท
2d
ยท
Discuss:
Blogger
๐ง
System Design
Loading...
Loading more...
« Page 15
โข
Page 17 »
Keyboard Shortcuts
Navigation
Next / previous item
j
/
k
Open post
o
or
Enter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
g
h
Interests
g
i
Feeds
g
f
Likes
g
l
History
g
y
Changelog
g
c
Settings
g
s
Browse
g
b
Search
/
Pagination
Next page
n
Previous page
p
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc
Press
?
anytime to show this help